supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...
supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61672347);National Cryptography Development Fund (Grant Nos. MMJJ20180101, MMJJ20180202);Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No. AGK201703);Shanghai Sailing Program (Grant No. 17YF1405500);Graduate Student Innovation Fund of Donghua University (Grant No. GSIF-DH-M-2019013)。
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t...
supported in part by National Natural Science Foundation of China(Grant No.61802214);National Natural Science Foundation of Shandong Province,China(Grant No.ZR2019BF009);Applied Fundamental Research Project of Qingdao(Grant No.19-6-2-6-cg);Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ007)。
Dear editor,To maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access policy(or attributes)before outsourcing them to the cloud.In the traditional access control...
National Key Research and Development Program of China(Grant Nos.2017YFB0802005,2018YFB0804105);National Natural Science Foundation of China(Grant No.61602046);National Natural Science Foundation of China(Grant Nos.61872236;61572192);National Natural Science Foundation of China(Grant No.U1536205);Young Elite Scientists Sponsorship Program by CAST(Grant No.2016QNRC001);Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Grant No.2017B030301004);National Cryptography Development Fund(Grant No.MMJJ20170209);Anhui Initiative in Quantum Information Technologies(Grant No.AHY150100);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Natural Science Foundation of China(Grant No.U1536205).
Based on the identity-based encryption(IBE)from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12)presented a CCA1-secure public-key encryption(PKE),which has the best known efficiency in ...
supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61472250, 61672347, 61402288, 61402286, 61572192);Shanghai Natural Science Foundation (Grant Nos. 15ZR1400300, 16ZR1401100);Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (Grant No. AGK201703);Opening Project of Shanghai Key Laboratory of Scalable Computing and Systems;National Cryptography Development Fund (Grant No. MMJJ20180101);Fundamental Research Funds for the Central Universities;Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-17-008)
Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the Internet.This cipher was proposed by Banik et al.and presented at the ASIACRYPT co...
supported by National Natural Science Foundation of China (Grant Nos. 61202179, 61173089, 61472298, 61472310, U1405255, 61502248);National High-Tech R&D Program (863) (Grant No. 2015AA016007);SRF for ROCS, SEM and Fundamental Research Funds for the Central Universities
Attribute-Based Encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issue...
supported by the National Natural Science Foundation of China (Grant No. 60772136);the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z435);National Key Technologies R & D Program of China during the 9th Five-Year Plan Period (Grants Nos. 2008BAH22B03, 2007BAH08B01);National 111 Program (Grant No. B08038)
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user's full private key. Most of t...